Company Website
Company Website

Ratings and Reviews 123 Ratings

Total
ease
features
design
support

Ratings and Reviews 54 Ratings

Total
ease
features
design
support

Media

Media

Integrations Supported

Alpine Linux
Autotask PSA
ConnectWise RMM
Debian
Docker
Fedora CoreOS
FileZilla Pro
Google Authenticator
Microsoft Edge
Mozilla Firefox
ONLYOFFICE
Oracle Cloud Container Registry
Oracle Linux
Raspberry Pi OS
Skycloak
Slack
Telegram
Thunderbird
Ubuntu for Raspberry Pi
Vivaldi

Integrations Supported

Alpine Linux
Autotask PSA
ConnectWise RMM
Debian
Docker
Fedora CoreOS
FileZilla Pro
Google Authenticator
Microsoft Edge
Mozilla Firefox
ONLYOFFICE
Oracle Cloud Container Registry
Oracle Linux
Raspberry Pi OS
Skycloak
Slack
Telegram
Thunderbird
Ubuntu for Raspberry Pi
Vivaldi

API Availability

Has API

API Availability

Has API

Pricing Information

$0 Free Community Edition
Free Trial Offered?
Free Version

Pricing Information

$0/month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Kasm Technologies

Date Founded

2017

Company Location

United States

Company Website

www.kasmweb.com

Company Facts

Organization Name

Heimdal®

Date Founded

2014

Company Location

Denmark

Company Website

heimdalsecurity.com

Categories and Features

Application Virtualization

Conflict Prevention
Cross-Platform Support
Dashboard
Debugging
Incident Management
Legacy App Support
Memory Protection
Multiple App Instances

Cloud Workload Protection

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity

Container Management

Access Control
Application Development
Automatic Scaling
Build Automation
Container Health Management
Container Storage
Deployment Automation
File Isolation
Hybrid Deployments
Network Isolation
Orchestration
Shared File Systems
Version Control
Virtualization

Container Security

Access Roles / Permissions
Application Performance Tracking
Centralized Policy Management
Container Stack Scanning
Image Vulnerability Detection
Reporting
Testing
View Container Metadata

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Desktop as a Service (DaaS)

Admin Console
Application Management
BYOL Management
Backup & Recovery
Cloud Encryption
Device Management
File Management
GPU Virtualization
Multi-Factor Authentication
Policy Management
Single Sign On
User Provisioning

DevOps

Approval Workflow
Dashboard
KPIs
Policy Management
Portfolio Management
Prioritization
Release Management
Timeline Management
Troubleshooting Reports

Digital Workplace

Activity / News Feed
Calendar Management
Chat / Messaging
Content Management
Document Management
Employee Directory
File Sharing
Knowledge Management
Surveys & Feedback
Task Management

Remote Desktop

Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management

Virtual Desktop (VDI)

Desktop-as-a-Service
Load Balancing
Multi-Device Support
Multi-Factor Authentication
Permissions / Access Controls
Self Service Portal
Third Party Integration

Virtualization

Archiving & Retention
Capacity Monitoring
Data Mobility
Desktop Virtualization
Disaster Recovery
Namespace Management
Performance Management
Version Control
Virtual Machine Monitoring

Web Content Filtering

Antivirus
Automated Blacklist
Browser-based Management Portal
Category / Keyword Filters
LDAP Integration
Multi-Language Filtering
Reporting / Analytics
Roles / Permissions
SSL Inspection
Time-based Controls
VPN Blocking
White Label
Whitelisting

Categories and Features

Application Security

Analytics / Reporting
Open Source Component Monitoring
Source Code Analysis
Third-Party Tools Integration
Training Resources
Vulnerability Detection
Vulnerability Remediation

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Data Loss Prevention

Compliance Reporting
Incident Management
Policy Management
Sensitive Data Identification
Web Threat Management
Whitelisting / Blacklisting

Email Security

Anti Spam
Anti Virus
Email Attachment Protection
Encryption
Policy Management
Quarantine
Reporting/Analytics
Whitelisting / Blacklisting

Endpoint Detection and Response (EDR)

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Firewall

Alerts / Notifications
Application Visibility / Control
Automated Testing
Intrusion Prevention
LDAP Integration
Physical / Virtual Environment
Sandbox / Threat Simulation
Threat Identification

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Security

Anti Spam
Anti Virus
Email Attachment Protection
Event Tracking
IP Protection
Internet Usage Monitoring
Intrusion Detection System
Spyware Removal
Two-Factor Authentication
Vulnerability Scanning
Web Threat Management
Web Traffic Reporting

MSP

Backup Management
Billing & Invoicing
CRM
Dashboard
Help Desk
Issue Management
Live Chat
Patch Management
Privileged Access Management (PAM)
Project Management
Remote Access
Remote Systems Monitoring
Scheduling

Patch Management

Alerts/Notifications
Automatic Approval
Automatic Patch Deployment
Automatic Scans
Compliance Management
Custom Patches
Dashboard
Network Wide Management
Patch Prioritization
Patch Testing
Remote Access/Control
Vulnerability Scanning

Privileged Access Management

Application Access Control
Behavioral Analytics
Credential Management
Endpoint Management
For MSPs
Granular Access Controls
Least Privilege
Multifactor Authentication
Password Management
Policy Management
Remote Access Management
Threat Intelligence
User Activity Monitoring

Remote Desktop

Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management

RMM

Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management

SIEM

Application Security
Behavioral Analytics
Compliance Reporting
Endpoint Management
File Integrity Monitoring
Forensic Analysis
Log Management
Network Monitoring
Real Time Monitoring
Threat Intelligence
User Activity Monitoring

Vulnerability Management

Asset Discovery
Asset Tagging
Network Scanning
Patch Management
Policy Management
Prioritization
Risk Management
Vulnerability Assessment
Web Scanning

Popular Alternatives

Popular Alternatives

SparkView Reviews & Ratings

SparkView

beyond SSL