Ratings and Reviews 0 Ratings

Total
ease
features
design
support

This software has no reviews. Be the first to write a review.

Write a Review

Ratings and Reviews 3 Ratings

Total
ease
features
design
support

Alternatives to Consider

  • Heimdal Endpoint Detection and Response (EDR) Reviews & Ratings
    54 Ratings
    Company Website
  • ESET PROTECT Advanced Reviews & Ratings
    1,051 Ratings
    Company Website
  • Cynet All-in-One Cybersecurity Platform Reviews & Ratings
    372 Ratings
    Company Website
  • Carbon Black EDR Reviews & Ratings
    281 Ratings
    Company Website
  • DriveLock Reviews & Ratings
    1 Rating
    Company Website
  • Guardz Reviews & Ratings
    56 Ratings
    Company Website
  • 1Password Reviews & Ratings
    16,122 Ratings
    Company Website
  • ManageEngine Endpoint Central Reviews & Ratings
    2,066 Ratings
    Company Website
  • NinjaOne Reviews & Ratings
    2,427 Ratings
    Company Website
  • Action1 Reviews & Ratings
    455 Ratings
    Company Website

What is Trusted Knight Protector Endpoint?

Protector Air is dedicated to securing individual sessions and the transactions that occur within those sessions. Complementing this, Protector Endpoint significantly boosts security for both internal and external endpoints by actively disabling the keylogging and data-extraction capabilities of malware, effectively preventing the theft of critical corporate or user credentials and other private information that cybercriminals might exploit for fraudulent activities or unauthorized access to corporate networks. Tailored specifically to combat crimeware attacks, Protector Endpoint acknowledges the rising intricacy of these threats, which can render traditional antivirus detection-and-removal methods inadequate. Many standard endpoint protection solutions can be unwieldy and challenging to manage, making them less appealing options for users. Instead of merely concentrating on detecting and eliminating crimeware, Protector Endpoint adopts a proactive strategy by neutralizing the operations of crimeware, thus obstructing its ability to collect sensitive user data. As a result, without access to the information entered by users in their web browsers, cybercriminals find it increasingly difficult to execute their illicit plans. This change in approach underscores the urgent necessity for more advanced security solutions to keep pace with the ever-evolving landscape of cyber threats, emphasizing that innovation is crucial for effective protection.

What is LogMeIn Central by GoTo?

LogMeIn Central, offered by GoTo, is an entirely cloud-driven remote monitoring tool designed for IT professionals to oversee, control, and protect their endpoint environments. This solution empowers IT teams with the agility, speed, and analytical capabilities essential for enhancing productivity, lowering IT expenses, and minimizing risks, even in scenarios where remote workers and devices are dispersed worldwide. By leveraging this technology, organizations can streamline their operations and improve overall efficiency.

Media

Media

Integrations Supported

AuthPoint
Axonius
Check Point Quantum SD-WAN
ClickShare Conference
Control D
Datto RMM
Datto Workplace
DoubleClue
Indent
Intel Tiber AI Studio
Intelligent ABM
MyGlue
Network Glue
ScalePad

Integrations Supported

AuthPoint
Axonius
Check Point Quantum SD-WAN
ClickShare Conference
Control D
Datto RMM
Datto Workplace
DoubleClue
Indent
Intel Tiber AI Studio
Intelligent ABM
MyGlue
Network Glue
ScalePad

API Availability

Has API

API Availability

Has API

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Pricing Information

Pricing not provided.
Free Trial Offered?
Free Version

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Supported Platforms

SaaS
Android
iPhone
iPad
Windows
Mac
On-Prem
Chromebook
Linux

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Customer Service / Support

Standard Support
24 Hour Support
Web-Based Support

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Training Options

Documentation Hub
Webinars
Online Training
On-Site Training

Company Facts

Organization Name

Trusted Knight Corporation

Date Founded

2010

Company Location

United States

Company Website

www.trustedknight.com/protector-endpoint-protection/

Company Facts

Organization Name

GoTo

Date Founded

2003

Company Location

United States

Company Website

www.logmein.com/central

Categories and Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Categories and Features

Endpoint Protection

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

IT Asset Management

Asset Tracking
Audit Management
Compliance Management
Configuration Management
Contract/License Management
Cost Tracking
Depreciation Management
IT Service Management
Inventory Management
Maintenance Management
Procurement Management
Requisition Management
Supplier Management

IT Management

Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring

IT Service

Contract Management
IT Asset Management
Incident Management
Knowledge Management
Release Management
Self Service Portal
Service Catalog
Service Reporting
Ticket Management

Remote Desktop

Chat
Cross-Platform Access
File Transfer
Group View
Mobile Device Access
Multi Monitor Support
Record Remote Sessions
Remote Print
Remote Wake
User Management

RMM

Deployment Management
For MSPs
IT Asset Management
Mobile Access
Network Monitoring
Patch Management
Real-time Alerts
Remediation Management

Popular Alternatives

Popular Alternatives