Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Alternatives to Consider

  • ManageEngine Endpoint Central Reviews & Ratings
    2,501 Ratings
    Company Website
  • Guardz Reviews & Ratings
    106 Ratings
    Company Website
  • Blumira Reviews & Ratings
    146 Ratings
    Company Website
  • Bitdefender Ultimate Small Business Security Reviews & Ratings
    3 Ratings
    Company Website
  • Orca Security Reviews & Ratings
    495 Ratings
    Company Website
  • ManageEngine Log360 Reviews & Ratings
    141 Ratings
    Company Website
  • Airlock Digital Reviews & Ratings
    35 Ratings
    Company Website
  • JDisc Discovery Reviews & Ratings
    27 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,511 Ratings
    Company Website
  • Iru Reviews & Ratings
    1,487 Ratings
    Company Website

What is Sandfly Security?

Recognized for its ability to secure vital infrastructure globally, Sandfly delivers agentless Linux security that removes the necessity for endpoint agents, resulting in a streamlined user experience. Its deployment is instant, emphasizing system stability while maintaining high-security standards. As an agentless solution, Sandfly is crafted to monitor Linux systems efficiently and securely. It protects a diverse array of Linux environments, spanning from modern cloud setups to older devices, regardless of their distribution or processor architecture. Beyond traditional Endpoint Detection and Response (EDR) functionalities, Sandfly adeptly oversees SSH credentials, uncovers weak passwords through thorough audits, identifies unauthorized changes via drift detection, and offers customizable modules to tackle new and evolving threats. This holistic strategy ensures optimal safety, efficiency, and compatibility throughout Linux systems. In addition, Sandfly distinguishes itself in the marketplace by offering extensive support for various Linux distributions and processor types, such as AMD, Intel, Arm, MIPS, and POWER CPUs, making it a versatile choice for organizations. Ultimately, with Sandfly, organizations can confidently enhance their Linux security posture, ensuring it meets the demands of their multifaceted technological environments while remaining adaptable to future challenges.

What is Google Endpoint Management?

Optimizing your workflows is critical, particularly for managing endpoints across diverse operating systems such as Android, iOS, Windows, Chrome OS, MacOS, and Linux, all of which can be readily configured and overseen. The occurrence of misplaced phones or stolen tablets is frequent, making it imperative to protect your organization’s data through effective endpoint management solutions. Implementing measures such as enforced screen locks and strong password requirements can safeguard sensitive information, while functionalities like device wiping or selective account wiping for both Android and iOS further enhance your data protection strategy. Furthermore, limiting access to specific sessions on systems like Windows, Chrome OS, Linux, and MacOS can bolster overall security measures. G Suite provides a user-friendly method to streamline endpoint management, enabling you to mandate passcodes and remotely erase certain accounts without the necessity of installing any software on users' Android and iOS devices, as its agentless endpoint management feature comes activated by default. You can also manage and secure Windows 10 devices directly through the Admin console, as well as distribute business applications seamlessly via the Admin console on Google Play or Apple’s App Store, in addition to hosting internal-only Android applications within the Play Private Channel for greater convenience. By leveraging these robust tools, organizations can enhance the security and efficiency of their device management protocols, ultimately fostering a more resilient operational environment. Moreover, keeping your endpoint management strategies updated is essential to adapt to the ever-evolving landscape of cybersecurity threats.

Media

Media

Integrations Supported

Google Cloud Platform
AWS Hybrid Cloud
Akamai Cloud
Amazon Web Services (AWS)
Arch Linux
CyberArk Conjur
Debian
Docker
Elasticsearch
Fedora
Google Cloud Identity
HashiCorp Consul
IBM QRadar EDR
Microsoft Azure
Oracle Advanced Security
Podman
Raspberry Pi OS
Rocky Linux
SUSE Enterprise Storage
Setyl

Integrations Supported

Google Cloud Platform
AWS Hybrid Cloud
Akamai Cloud
Amazon Web Services (AWS)
Arch Linux
CyberArk Conjur
Debian
Docker
Elasticsearch
Fedora
Google Cloud Identity
HashiCorp Consul
IBM QRadar EDR
Microsoft Azure
Oracle Advanced Security
Podman
Raspberry Pi OS
Rocky Linux
SUSE Enterprise Storage
Setyl

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

$6 per user per month
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Sandfly Security

Company Location

New Zealand

Company Website

sandflysecurity.com

Company Facts

Organization Name

Google

Date Founded

1998

Company Location

United States

Company Website

gsuite.google.com/products/admin/endpoint/

Categories and Features

Cybersecurity

AI / Machine Learning
Behavioral Analytics
Endpoint Management
IOC Verification
Incident Management
Tokenization
Vulnerability Scanning
Whitelisting / Blacklisting

Incident Response

Attack Behavior Analytics
Automated Remediation
Compliance Reporting
Forensic Data Retention
Incident Alerting
Incident Database
Incident Logs
Incident Reporting
Privacy Breach Reporting
SIEM Data Ingestion / Correlation
SLA Tracking / Management
Security Orchestration
Threat Intelligence
Timeline Analysis
Workflow Automation
Workflow Management

Categories and Features

Mobile Device Management (MDM)

Automatic Device Recognition
Data Management
Deployment Management
Inventory Management
Maintenance Utilities
Procurement Management
Remote Update / Installation
Software Management
Synchronization Management
Wireless Network Support

Popular Alternatives

SanerNow Reviews & Ratings

SanerNow

SecPod Technologies

Popular Alternatives

Hexnode UEM Reviews & Ratings

Hexnode UEM

Mitsogo Inc
KACE by Quest Reviews & Ratings

KACE by Quest

Quest Software
Scalefusion Reviews & Ratings

Scalefusion

ProMobi Technologies